Unlock instant, AI-driven research and patent intelligence for your innovation.
A self-protection method and device for an all-netcom dsds terminal
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A protection device, a technology of all Netcoms, applied in the field of self-protection of all Netcom DSDS terminals, can solve problems such as loss or theft of mobile terminals, and achieve the effects of reducing value, enhancing security, and ensuring property safety
Active Publication Date: 2019-02-22
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF5 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
However, in daily life, mobile terminals are lost or stolen from time to time. When a mobile terminal is lost or stolen, the picker or thief can continue to use the mobile terminal
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0030] Embodiment 1 of the present invention provides a self-protection method for a full Netcom DSDS (Dual SIM Dual Standby) terminal. The network standards included in the Full Netcom DSDS terminal include GSM, CDMA, TD-SCDMA, WCDMA, TD-LTE and FDD -LTE, this embodiment will be described in detail below in conjunction with the accompanying drawings. figure 1 It is a flow chart of the method of Embodiment 1 of the present invention, please refer to figure 1 , the method of the embodiment of the present invention includes the following steps:
[0031] Step S101, when receiving an instruction sent by a pre-bound security contact, determine whether the instruction is an instruction to control the DSDS terminal of Netcom to block radio frequency;
[0032] Specifically, in the setting of the all-netcom DSDS terminal, a security contact can be set in advance. After the setting is complete, you need to bind with the security contact to complete the relevant security interaction. ...
Embodiment 2
[0047] Embodiment 2 of the present invention provides a self-protection device for a full Netcom DSDS terminal, please refer to figure 2 , the device according to the embodiment of the present invention includes a judging module 1, a baseband control module 2 and a blocking unblocking module 3, and the principles of the above modules will be described in detail below.
[0048] The judging module 1 is used for judging whether the instruction is an instruction to control the DSDS terminal of Netcom to block the radio frequency when receiving the instruction sent by the pre-bound security contact.
[0049] Specifically, in the setting of the all-netcom DSDS terminal, a security contact can be set in advance. After the setting is complete, you need to bind with the security contact to complete the relevant security interaction.
[0050] When the All Netcom DSDS terminal is stolen or lost, the user can send a short message to the All Netcom DSDS terminal through the pre-bound sec...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a self-protection method and device for a full-network DSDS terminal. The method includes the following steps: when receiving an instruction sent by a pre-bound security contact, judging whether the instruction is to control the full-network DSDS terminal Instructions for radio frequency blocking; if yes, put the radio frequency module of the terminal in non-signaling mode, and force the radio frequency module to continuously transmit TD-SCDMA, LTE, WCDMA, CDMA2000, EVDO or GSM high-power signals that can block received signals according to the current network standard. Signal, to achieve radio frequency blocking and rapid discharge of the terminal, so that the terminal cannot communicate and shut down quickly. The present invention effectively strengthens the security of the terminal, guarantees the property safety of the user, and at the same time reduces the value of the terminal in the hands of pickers or thieves, increases the initiative of the owner in the subsequent negotiation process, and increases the loss or theft of the terminal Possibility of subsequent recovery.
Description
technical field [0001] The present invention relates to the technical field of mobile terminals, and more specifically, relates to a self-protection method and device for a full-network DSDS terminal. Background technique [0002] With the continuous development of science and technology, dual-card dual-standby mobile terminals (that is, full-netcom DSDS terminals) such as mobile phones and tablet computers based on the full-network standard play an increasingly important role in people's lives. However, in daily life, the mobile terminal is lost or stolen from time to time. When the mobile terminal is lost or stolen, the picker or the thief can continue to use the mobile terminal. Therefore, how to strengthen the security of mobile terminals has become an urgent problem for manufacturers to solve. Contents of the invention [0003] The purpose of the present invention is to overcome the above-mentioned defects in the prior art, and provide a self-protection method and de...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.